Ost: Improving generalization of deepfake detection via one-shot test-time training

L Chen, Y Zhang, Y Song… - Advances in Neural …, 2022 - proceedings.neurips.cc
State-of-the-art deepfake detectors perform well in identifying forgeries when they are
evaluated on a test set similar to the training set, but struggle to maintain good performance …

Evading deepfake detectors via adversarial statistical consistency

Y Hou, Q Guo, Y Huang, X Xie… - Proceedings of the …, 2023 - openaccess.thecvf.com
In recent years, as various realistic face forgery techniques known as DeepFake improves
by leaps and bounds, more and more DeepFake detection techniques have been proposed …

Learning to distill global representation for sparse-view CT

Z Li, C Ma, J Chen, J Zhang… - Proceedings of the IEEE …, 2023 - openaccess.thecvf.com
Sparse-view computed tomography (CT)---using a small number of projections for
tomographic reconstruction---enables much lower radiation dose to patients and …

Frequency-aware GAN for adversarial manipulation generation

P Zhu, G Osada, H Kataoka… - Proceedings of the …, 2023 - openaccess.thecvf.com
Image manipulation techniques have drawn growing concerns as manipulated images
might cause morality and security problems. Various methods have been proposed to detect …

An Analysis of Recent Advances in Deepfake Image Detection in an Evolving Threat Landscape

SM Abdullah, A Cheruvu, S Kanchi, T Chung… - arXiv preprint arXiv …, 2024 - arxiv.org
Deepfake or synthetic images produced using deep generative models pose serious risks to
online platforms. This has triggered several research efforts to accurately detect deepfake …

Visual embedding augmentation in fourier domain for deep metric learning

Z Wang, Z Gao, G Wang, Y Yang… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Deep Metric Learning (DML) is very effective for many computer vision applications such as
image retrieval or cross-modal matching. The common paradigm for DML is to seek metric …

[PDF][PDF] Digital and physical face attacks: Reviewing and one step further

C Kong, S Wang, H Li - APSIPA Transactions on Signal and …, 2022 - nowpublishers.com
With the rapid progress over the past five years, face authentication has become the most
pervasive biometric recognition method. Thanks to the high-accuracy recognition …

Imperceptible adversarial attack via invertible neural networks

Z Chen, Z Wang, JJ Huang, W Zhao, X Liu… - Proceedings of the AAAI …, 2023 - ojs.aaai.org
Adding perturbations via utilizing auxiliary gradient information or discarding existing details
of the benign images are two common approaches for generating adversarial examples …

Frequency constraint-based adversarial attack on deep neural networks for medical image classification

F Chen, J Wang, H Liu, W Kong, Z Zhao, L Ma… - Computers in Biology …, 2023 - Elsevier
The security of AI systems has gained significant attention in recent years, particularly in the
medical diagnosis field. To develop a secure medical image classification system based on …

Traceevader: Making deepfakes more untraceable via evading the forgery model attribution

M Wu, J Ma, R Wang, S Zhang, Z Liang, B Li… - Proceedings of the …, 2024 - ojs.aaai.org
In recent few years, DeepFakes are posing serve threats and concerns to both individuals
and celebrities, as realistic DeepFakes facilitate the spread of disinformation. Model …